Principles of Information Systems (MindTap Course List)
Principles of Information Systems (MindTap Course List)
12th Edition
ISBN: 9781285867168
Author: Ralph Stair, George Reynolds
Publisher: Cengage Learning
Question
Book Icon
Chapter 3, Problem 2CE
Program Plan Intro

Components of computer:

Computer has four major components, they are:

  • Central processing unit (CPU)
  • Memory unit
  • Input devices
  • Output devices

Central Processing Unit (CPU):

  • CPU plays the key role in a computer by carrying out instructions of a computer program.
  • It performs all the basic logic, arithmetic, controlling and input/output operations that are specified by the instructions.
  • The CPU comprises of two units, Arithmetic logic unit (ALU) and control unit (CU).

Memory unit:

  • Once computer program instructions set are transformed into machine code by CPU, the machine code is stored in memory.
  • Then the CPU fetches the required data and instructions from memory, perform the required operations and then sends the result and next set of instructions back to memory.

Input devices:

  • The devices used by the user to feed information to computer, such as a hard drive, keyboard, or a networking card.
  • These devices get the data from outside world into computer in the way that human eyes and ears bring the data to brain.

Output devices:

  • Output devices are used by computer to deliver the information to the user, such as a monitor, printer, and speaker.
  • The CPU takes the machine code present in memory and converts it into a format that is required by monitor’s hardware.
  • Then the monitor’s hardware alters that information into different light intensities such that words or pictures are seen.

Explanation of Solution

Defining user needs:

  • The user needs are to be defined based on department.
  • Each department representative takes care of respective user needs...

Explanation of Solution

Need of multiple portable computers:

  • It is better to select different portable computers based on needs of user.
  • The class of portable computers may change based on different needs of user...

Blurred answer
Students have asked these similar questions
We are considering the RSA encryption scheme. The involved numbers are small, so the communication is insecure.  Alice's public key (n,public_key) is (247,7). A code breaker manages to factories  247 = 13 x 19  Determine Alice's secret key. To solve the problem, you need not use the extended Euclid algorithm, but you may assume that her private key is one of the following numbers 31,35,55,59,77,89.
Consider the following Turing Machine (TM). Does the TM halt if it begins on the empty tape? If it halts, after how many steps? Does the TM halt if it begins on a tape that contains a single letter A followed by blanks? Justify your answer.
Pllleasassseee ssiiirrrr soolveee thissssss questionnnnnnn

Chapter 3 Solutions

Principles of Information Systems (MindTap Course List)

Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education